Search results
1 – 10 of 96The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…
Abstract
Purpose
The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.
Design/methodology/approach
This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.
Findings
The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.
Originality/value
This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.
Details
Keywords
This paper aims to establish the link between the attitudes older adults hold toward governmental websites, their subjective online public service use skills and their…
Abstract
Purpose
This paper aims to establish the link between the attitudes older adults hold toward governmental websites, their subjective online public service use skills and their e-government use for bureaucratic (e.g. document downloading or filling them out online) and transactional (e.g. payment) purposes.
Design/methodology/approach
Data were obtained from the 2020 Israel Social Survey and analyzed using binary logistic regression models. The sample included internet users aged 60 years and older (N = 735).
Findings
Subjective use skills were positively associated with each studied type of e-government use. Perception of security in providing personal information on governmental websites was also positively associated with both types of use. Perceived clarity and simplicity of governmental websites was (positively) related to transactional e-government use only.
Research limitations/implications
The results suggest that the types of e-government use in older adulthood are not contingent upon exactly the same factors. Moreover, attitudes toward e-government seem to be more relevant for transactional rather than bureaucratic e-government use in this lifespan period.
Originality/value
The study examines factors related to government website uses of various types in later life – a rarely studied topic in e-government research.
Details
Keywords
Manuel Pedro Rodríguez Bolívar and Laura Alcaide Muñoz
This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging…
Abstract
Purpose
This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging technologies (ETs) in public services delivery.
Design/methodology/approach
VOSviewer and SciMAT techniques were used for clustering and mapping the use of ETs in the public services delivery. Collecting documents from the DGRL v16.6 database, the paper uses text mining analysis for identifying key terms and trends in e-Government research regarding ETs and public services.
Findings
The analysis indicates that all ETs are strongly linked to each other, except for blockchain technologies (due to its disruptive nature), which indicate that ETs can be, therefore, seen as accumulative knowledge. In addition, on the whole, findings identify four stages in the evolution of ETs and their application to public services: the “electronic administration” stage, the “technological baseline” stage, the “managerial” stage and the “disruptive technological” stage.
Practical implications
The output of the present research will help to orient policymakers in the implementation and use of ETs, evaluating the influence of these technologies on public services.
Social implications
The research helps researchers to track research trends and uncover new paths on ETs and its implementation in public services.
Originality/value
Recent research has focused on the need of implementing ETs for improving public services, which could help cities to improve the citizens’ quality of life in urban areas. This paper contributes to expanding the knowledge about ETs and its implementation in public services, identifying trends and networks in the research about these issues.
Details
Keywords
Birgit Schenk, Mateusz Dolata, Christiane Schwabe and Gerhard Schwabe
By increasing the digitalization of commercial services citizens' expect more from public services. First of all, this study will strive to identify which problems citizens…
Abstract
Purpose
By increasing the digitalization of commercial services citizens' expect more from public services. First of all, this study will strive to identify which problems citizens encounter when they use a complex public service: preparation of an application for a building permit. In the light of the popularity of omnichannel approaches, the study then explores how omni-channel could help to address the problems which have been identified.
Design/methodology/approach
We implement the first phases of an action design science research project. We collect data both from citizens and public agencies and frame them as transparency problems. These abstract problems are then addressed by an omnichannel service provision as an abstract solution. The abstract solution is then instantiated in a design in the form of a user scenario developed in collaboration with current and future public officials.
Findings
The analysis uncovers multiple transparency issues: it distinguishes between process, case, language, cross-channel and cost transparency. One root cause of the transparency issues observed is the lack of service transparency which defines the purpose and scope of a ser-vice. We therefore recommend defining a service-strategy before informational and technical aspects of an omnichannel approach can be implemented. Following this strategy, omnichannel offers public administrations unique opportunities to excel in citizens' service provision.
Originality/value
The study provides insights into how citizens view complex public services. For researchers, this study offers the conceptualization as transparency issues. Practitioners from the public administrations can also benefit from the concept and vision of omnichannel public services.
Details
Keywords
Dilek Şahin, Mehmet Nurullah Kurutkan and Tuba Arslan
Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services…
Abstract
Purpose
Today, e-government (electronic government) applications have extended to the frontiers of health-care delivery. E-Nabız contains personal health records of health services received, whether public or private. The use of the application by patients and physicians has provided efficiency and cost advantages. The success of e-Nabız depends on the level of technology acceptance of health-care service providers and recipients. While there is a large research literature on the technology acceptance of service recipients in health-care services, there is a limited number of studies on physicians providing services. This study aims to determine the level of influence of trust and privacy variables in addition to performance expectancy, effort expectancy, social influence and facilitating factors in the unified theory of acceptance and use of technology (UTAUT) model on the intention and behavior of using e-Nabız application.
Design/methodology/approach
The population of the study consisted of general practitioners and specialist physicians actively working in any health facility in Turkey. Data were collected cross-sectionally from 236 physicians on a voluntary basis through a questionnaire. The response rate of data collection was calculated as 47.20%. Data were collected cross-sectionally from 236 physicians through a questionnaire. Descriptive statistics, correlation analysis and structural equation modeling were used to analyze the data.
Findings
The study found that performance expectancy, effort expectancy, trust and perceived privacy had a significant effect on physicians’ behavioral intentions to adopt the e-Nabız system. In addition, facilitating conditions and behavioral intention were determinants of usage behavior (p < 0.05). However, no significant relationship was found between social influence and behavioral intention (p > 0.05).
Originality/value
This study confirms that the UTAUT model provides an appropriate framework for predicting factors influencing physicians’ behaviors and intention to use e-Nabız. In addition, the empirical findings show that trust and perceived privacy, which are additionally considered in the model, are also influential.
Details
Keywords
Ahmed Shafiqul Huque and Jannatul Ferdous
The paper aims to examine the state of electronic service delivery in Bangladesh. It reviews the structure and operation of the “e-service” centers at the district, sub-district…
Abstract
Purpose
The paper aims to examine the state of electronic service delivery in Bangladesh. It reviews the structure and operation of the “e-service” centers at the district, sub-district (upazila), and union levels by taking an inventory and assessing their contributions.
Design/methodology/approach
The paper is based on a review of the functions and operations of the service delivery agencies with reference to the claims made by the government. It is based on secondary materials obtained from academic studies, government documents, relevant websites, and media reports.
Findings
Electronic delivery of public services in Bangladesh has not been effective as planned. There are issues regarding channels of communication, the competence of public officials, human and financial resources, and political will to support the agencies delivering public services.
Originality/value
The paper examines the arrangements, practices, and problems of delivery of public services in Bangladesh through e-service centers at the local levels to determine the progress and potentials of employing digital technology for addressing problems. It proposes the strategy for public service delivery by using digital technology in the country.
Details
Keywords
Beena Kumari, Anuradha Madhukar and Sangeeta Sahney
The paper develops a model for enhancing R&D productivity for Indian public funded laboratories. The paper utilizes the productivity data of five Council of Scientific and…
Abstract
Purpose
The paper develops a model for enhancing R&D productivity for Indian public funded laboratories. The paper utilizes the productivity data of five Council of Scientific and Industrial Research (CSIR) laboratories for analysis and to form the constructs of the model.
Design/methodology/approach
The weighted average method was employed for analyzing the rankings of survey respondents pertaining to the significant measures enhancing R&D involvement of researchers and significant non-R&D jobs. The authors have proposed a model of productivity. Various individual, organizational and environmental constructs related to the researchers working in the CSIR laboratories have been outlined that can enhance R&D productivity of researchers in Indian R&D laboratories. Partial Least Squares-Structural Equation Modeling (PLS-SEM) was used to find the predictability of the productivity model.
Findings
The organizational factors have a crucial role in enhancing the R&D outputs of CSIR laboratories. The R&D productivity of researchers can be improved through implementing the constructs of the proposed model of productivity.
Research limitations/implications
The R&D productivity model can be adapted by the R&D laboratories to enhance researchers’ R&D involvement, increased R&D outputs and achieving self-sustenance in long run.
Practical implications
The R&D laboratories can initiate exercises to explore the most relevant factors and measures to enhance R&D productivity of their researchers. The constructs of the model can function as a guideline to introduce the most preferable research policies in the laboratory for overall mutual growth of laboratory and the researchers.
Originality/value
Hardly any studies have been found that have focused on finding the measures of enhancing R&D involvement of researchers and the influence of significant time-intensive jobs on researchers’ productivity.
Details
Keywords
Hedaia-t-Allah Nabil Abd Al Ghaffar
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Abstract
Purpose
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Design/methodology/approach
The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.
Findings
The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.
Practical implications
Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.
Originality/value
The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.
Details
Keywords
Marzena Remlein, Svitlana Chugaievska, Grażyna Dehnel and Kateryna Romanchuk
The authors aimed to examine how the level of digitalization in Poland and Ukraine affects the contribution of small and medium-sized enterprises (SMEs) to the countries’ gross…
Abstract
Purpose
The authors aimed to examine how the level of digitalization in Poland and Ukraine affects the contribution of small and medium-sized enterprises (SMEs) to the countries’ gross domestic product (GDP).
Design/methodology/approach
The study involved a comparative analysis and statistical modeling of the impact of key economic factors on the contribution of SMEs to Poland’s and Ukraine’s GDP in the 2010–2020 period. The authors used principles of the theory of economic growth and calculated the coefficient of digital competitiveness as a composite indicator consisting of a number of global indices.
Findings
The study revealed significant differences between both countries, which can be attributed to a higher level of digitalization in Polish SMEs. The authors used the Polish experience to recommend how to reform Ukraine’s digital economy in postwar recovery.
Originality/value
The contribution of SMEs to Poland’s GDP is higher than that of Ukraine’s because of the higher entrepreneurship rate in the Polish micro and small enterprises (MSEs) sector. The authors found that a unit change in the integrated coefficient of digital competitiveness is related to the greatest change in the contribution of SMEs to the country’s GDP when the other factors in the model equation remain fixed.
Details
Keywords
Manoj Krishnan and Satish Krishnan
The study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.
Abstract
Purpose
The study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.
Design/methodology/approach
The study conducts a meta-synthesis of qualitative studies on resistance to technology projects; it analyzes those studies at a case-specific level, compares and contrasts emergent concepts against each other, and “translates” those to the rest of the studies. The study uses the seven-step meta-ethnography method by Noblit and Hare to reciprocally translate emergent concepts to construct the conceptual model.
Findings
Through meta-synthesis, the study derives a new conceptual model for resistance to information technology projects, exemplifying how the identified antecedents create user resistance and how the phenomenon progresses within organizations.
Research limitations/implications
This study enriches the observations and conclusions of past individual studies while explicating various facets of the mechanisms that generate and progress technology resistance within organizations. It offers fresh insights into the equivocal nature of the phenomenon and the distinctive ways it progresses from individual to group level.
Practical implications
Many ambitious and costly digital transformation efforts do not succeed due to user resistance. Understanding the mechanisms that create user resistance can help organizations manage technology projects better, thereby reducing the technology assimilation gap and protecting returns on related investments.
Originality/value
There have been extensive studies on technology acceptance (enablers) within organizations, while those relating to technology inhibitors are somewhat limited. However, the symmetry of understanding between enablers and inhibitors is vital for organizations to assimilate promising technologies and transform their business models. This model uses a new lens of sensemaking theory to explain how the antecedents trigger perceived threats and resistance behavior; it highlights the nuances around the development of resistance within individuals and its progression to groups. The resultant model offers better generalizability in organizational contexts.
Details